What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mamoun Alazab
Google Scholar
ORCID:
0000-0002-1928-3704
14
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
$\mathsf{TCG}\text{-}\mathsf{IDS}$ : Robust Network Intrusion Detection via Temporal Contrastive Graph Learning.
Cong Wu
Jianfei Sun
Jing Chen
Mamoun Alazab
Yang Liu
Yang Xiang
2024
journals/compsec
M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks.
Saeed Javanmardi
Meysam Ghahramani
Mohammad Shojafar
Mamoun Alazab
Antonio Caruso
2023
journals/compsec
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
PLS Jayalaxmi
Rahul Saha
Gulshan Kumar
Mamoun Alazab
Mauro Conti
Xiaochun Cheng
2023
journals/compsec
A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function.
Prajjwal Gupta
Krishna Yadav
Brij B. Gupta
Mamoun Alazab
Thippa Reddy Gadekallu
2023
journals/tifs
Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Xuehuan Yang
Mamoun Alazab
Robert H. Deng
2023
journals/tifs
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Xuehuan Yang
Mamoun Alazab
Robert H. Deng
2022
journals/compsec
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives.
Yassine Himeur
Shahab Saquib Sohail
Faycal Bensaali
Abbes Amira
Mamoun Alazab
2022
journals/compsec
Adversarial malware sample generation method based on the prototype of deep learning detector.
Yanchen Qiao
Weizhe Zhang
Zhicheng Tian
Laurence T. Yang
Yang Liu
Mamoun Alazab
2022
journals/tifs
A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
Jianfei Sun
Guowen Xu
Tianwei Zhang
Mamoun Alazab
Robert H. Deng
2022
conf/icics
Repetitive, Oblivious, and Unlinkable SkNN Over Encrypted-and-Updated Data on Cloud.
Meng Li
Mingwei Zhang
Jianbo Gao
Chhagan Lal
Mauro Conti
Mamoun Alazab
2020
journals/compsec
Image-Based malware classification using ensemble of CNN architectures (IMCEC).
Danish Vasan
Mamoun Alazab
Sobia Wassan
Babak Safaei
Zheng Qin
2020
journals/compsec
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media.
Milad Taleby Ahvanooey
Qianmu Li
Mark Xuefang Zhu
Mamoun Alazab
Jing Zhang
2020
journals/istr
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things.
Ashish Kumar
Rahul Saha
Mamoun Alazab
Gulshan Kumar
2019
journals/istr
A hybrid deep learning image-based analysis for effective malware detection.
Sitalakshmi Venkatraman
Mamoun Alazab
R. Vinayakumar
Coauthors
Abbes Amira
(1)
Antonio Caruso
(1)
Ashish Kumar
(1)
Babak Safaei
(1)
Brij B. Gupta
(1)
Chhagan Lal
(1)
Cong Wu
(1)
Danish Vasan
(1)
Faycal Bensaali
(1)
Gulshan Kumar
(2)
Guowen Xu
(3)
Jianbo Gao
(1)
Jianfei Sun
(4)
Jing Chen
(1)
Jing Zhang
(1)
Krishna Yadav
(1)
Laurence T. Yang
(1)
Mamoun Alazab
(14)
Mark Xuefang Zhu
(1)
Mauro Conti
(2)
Meng Li
(1)
Meysam Ghahramani
(1)
Milad Taleby Ahvanooey
(1)
Mingwei Zhang
(1)
Mohammad Shojafar
(1)
PLS Jayalaxmi
(1)
Prajjwal Gupta
(1)
Qianmu Li
(1)
R. Vinayakumar
(1)
Rahul Saha
(2)
Robert H. Deng
(3)
Saeed Javanmardi
(1)
Shahab Saquib Sohail
(1)
Sitalakshmi Venkatraman
(1)
Sobia Wassan
(1)
Thippa Reddy Gadekallu
(1)
Tianwei Zhang
(3)
Weizhe Zhang
(1)
Xiaochun Cheng
(1)
Xuehuan Yang
(2)
Yanchen Qiao
(1)
Yang Liu
(1)
Yang Liu
(1)
Yang Xiang
(1)
Yassine Himeur
(1)
Zheng Qin
(1)
Zhicheng Tian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to